In this section, we first define a set of notations, then use them to describe our protocols. The notations are defined as follow:
¯V : voter V.A : authority.
T : tallier.
: the public key of the authority.
: the private key of the authority.
: the tallying key (public key) of voter V.
: the voting key ( private key) of voter V.
R: a random number.
h: one-way hash function.
: the symmetric encryption key of voter V.
: the plaintext of ballot casted by Voter V.
: encrypt message M with key by symmetrical cryptosystem.
: decrypt cipher with key by symmetrical cryptosystem.
: signature on message M signed with the private key of .
: decrypt cipher C with the public key of .